Описание
ELSA-2023-4328: samba security and bug fix update (MODERATE)
[4.17.5-3.0.1]
- Fix memleak in _nss_winbind_initgroups_dyn [Orabug: 34727815]
- Gluster volumes not accessible via Samba due to missing samba-vfs-glusterfs in OL8 [Orabug: 30205755]
[4.17.5-3]
- resolves: rhbz#2223601 - Fix trust relationship between workstation and DC
- resolves: rhbz#2222895 - Fix CVE-2023-3347
Обновленные пакеты
Oracle Linux 8
Oracle Linux aarch64
ctdb
4.17.5-3.0.1.el8_8
libnetapi
4.17.5-3.0.1.el8_8
libnetapi-devel
4.17.5-3.0.1.el8_8
libsmbclient
4.17.5-3.0.1.el8_8
libsmbclient-devel
4.17.5-3.0.1.el8_8
libwbclient
4.17.5-3.0.1.el8_8
libwbclient-devel
4.17.5-3.0.1.el8_8
python3-samba
4.17.5-3.0.1.el8_8
python3-samba-dc
4.17.5-3.0.1.el8_8
python3-samba-devel
4.17.5-3.0.1.el8_8
python3-samba-test
4.17.5-3.0.1.el8_8
samba
4.17.5-3.0.1.el8_8
samba-client
4.17.5-3.0.1.el8_8
samba-client-libs
4.17.5-3.0.1.el8_8
samba-common
4.17.5-3.0.1.el8_8
samba-common-libs
4.17.5-3.0.1.el8_8
samba-common-tools
4.17.5-3.0.1.el8_8
samba-dc-libs
4.17.5-3.0.1.el8_8
samba-dcerpc
4.17.5-3.0.1.el8_8
samba-devel
4.17.5-3.0.1.el8_8
samba-krb5-printing
4.17.5-3.0.1.el8_8
samba-ldb-ldap-modules
4.17.5-3.0.1.el8_8
samba-libs
4.17.5-3.0.1.el8_8
samba-pidl
4.17.5-3.0.1.el8_8
samba-test
4.17.5-3.0.1.el8_8
samba-test-libs
4.17.5-3.0.1.el8_8
samba-tools
4.17.5-3.0.1.el8_8
samba-usershares
4.17.5-3.0.1.el8_8
samba-vfs-glusterfs
4.17.5-3.0.1.el8_8
samba-vfs-iouring
4.17.5-3.0.1.el8_8
samba-winbind
4.17.5-3.0.1.el8_8
samba-winbind-clients
4.17.5-3.0.1.el8_8
samba-winbind-krb5-locator
4.17.5-3.0.1.el8_8
samba-winbind-modules
4.17.5-3.0.1.el8_8
Oracle Linux x86_64
ctdb
4.17.5-3.0.1.el8_8
libnetapi
4.17.5-3.0.1.el8_8
libnetapi-devel
4.17.5-3.0.1.el8_8
libsmbclient
4.17.5-3.0.1.el8_8
libsmbclient-devel
4.17.5-3.0.1.el8_8
libwbclient
4.17.5-3.0.1.el8_8
libwbclient-devel
4.17.5-3.0.1.el8_8
python3-samba
4.17.5-3.0.1.el8_8
python3-samba-dc
4.17.5-3.0.1.el8_8
python3-samba-devel
4.17.5-3.0.1.el8_8
python3-samba-test
4.17.5-3.0.1.el8_8
samba
4.17.5-3.0.1.el8_8
samba-client
4.17.5-3.0.1.el8_8
samba-client-libs
4.17.5-3.0.1.el8_8
samba-common
4.17.5-3.0.1.el8_8
samba-common-libs
4.17.5-3.0.1.el8_8
samba-common-tools
4.17.5-3.0.1.el8_8
samba-dc-libs
4.17.5-3.0.1.el8_8
samba-dcerpc
4.17.5-3.0.1.el8_8
samba-devel
4.17.5-3.0.1.el8_8
samba-krb5-printing
4.17.5-3.0.1.el8_8
samba-ldb-ldap-modules
4.17.5-3.0.1.el8_8
samba-libs
4.17.5-3.0.1.el8_8
samba-pidl
4.17.5-3.0.1.el8_8
samba-test
4.17.5-3.0.1.el8_8
samba-test-libs
4.17.5-3.0.1.el8_8
samba-tools
4.17.5-3.0.1.el8_8
samba-usershares
4.17.5-3.0.1.el8_8
samba-vfs-glusterfs
4.17.5-3.0.1.el8_8
samba-vfs-iouring
4.17.5-3.0.1.el8_8
samba-winbind
4.17.5-3.0.1.el8_8
samba-winbind-clients
4.17.5-3.0.1.el8_8
samba-winbind-krb5-locator
4.17.5-3.0.1.el8_8
samba-winbind-modules
4.17.5-3.0.1.el8_8
samba-winexe
4.17.5-3.0.1.el8_8
Связанные CVE
Связанные уязвимости
A vulnerability was found in Samba's SMB2 packet signing mechanism. The SMB2 packet signing is not enforced if an admin configured "server signing = required" or for SMB2 connections to Domain Controllers where SMB2 packet signing is mandatory. This flaw allows an attacker to perform attacks, such as a man-in-the-middle attack, by intercepting the network traffic and modifying the SMB2 messages between client and server, affecting the integrity of the data.
A vulnerability was found in Samba's SMB2 packet signing mechanism. The SMB2 packet signing is not enforced if an admin configured "server signing = required" or for SMB2 connections to Domain Controllers where SMB2 packet signing is mandatory. This flaw allows an attacker to perform attacks, such as a man-in-the-middle attack, by intercepting the network traffic and modifying the SMB2 messages between client and server, affecting the integrity of the data.
A vulnerability was found in Samba's SMB2 packet signing mechanism. The SMB2 packet signing is not enforced if an admin configured "server signing = required" or for SMB2 connections to Domain Controllers where SMB2 packet signing is mandatory. This flaw allows an attacker to perform attacks, such as a man-in-the-middle attack, by intercepting the network traffic and modifying the SMB2 messages between client and server, affecting the integrity of the data.
A vulnerability was found in Samba's SMB2 packet signing mechanism. Th ...
A vulnerability was found in Samba's SMB2 packet signing mechanism. The SMB2 packet signing is not enforced if an admin configured "server signing = required" or for SMB2 connections to Domain Controllers where SMB2 packet signing is mandatory. This flaw allows an attacker to perform attacks, such as a man-in-the-middle attack, by intercepting the network traffic and modifying the SMB2 messages between client and server, affecting the integrity of the data.